-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
proposal: secrets management #557
Comments
Interesting. A suggestion about losing access to a self-hosted secrets service would be to have an encrypted backup stored somewhere, with a key that only a select few would know. Of course, all stored secrets would probably be encrypted symmetrically (some AES) and encoded in Base64. The keys would be distributed to organizational admins, and provided as an environmental variable. More advanced ideas include Shamir's secret sharing, where only when multiple sub-keys come together (but not all of them) that we can decrypt things (probably some last-ditch effort). But our secrets aren't that important, right? |
Ah. That's quite a few there. |
I imagine Vault would have some built-in support for this
This is assuming we DIY the secret management system ourselves, instead of using a service like Vault right? |
Yes. Btw: if we are going with a DIY secret management, the act of adding a secret via |
I would call this pretty bad 🤔 Maybe we can exclude/do special preprocessing for the chain of commands in |
I wonder if we can replace the actual password with |
^ That would be the standard approach if we have a hook for special preprocessing of the logged command |
Summary
We should be able to create and distribute credentials to subsets of Rocket users based on team.
Requirements
/rocket secret [create|view|delete|edit] $SECRET
for secrets CRUD/rocket secret [grant|rescind] $SECRET $TEAM
for providing accessContext
Suggested by @SarahBornais , who brings up a good point - we currently manage passwords through ad-hoc sharing or the private exec repository, which is pretty jank and unsafe.
My only concern with self-hosting our secrets is losing access to our instance of the secrets service would be a pretty big problem, whereas our current approach with the exec repository feels pretty permanent (if unsafe)
The text was updated successfully, but these errors were encountered: